/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Pulse API
API keys, docs, usage dashboard
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Person

Mike Lennon

8 articles stable
Articles
8
mentions
Velocity
0.0%
growth rate
Acceleration
0.000
velocity change
Sources
4
publications

Coverage Timeline

2022-01-17
Microsoft Security Blog 39 related

Microsoft identifies a destructive malware operation targeting Ukrainian organizations; the malware looks like ransomware but lacks a ransom recovery mechanism

European Union simulated a cyber attack on a fictitious Finnish power company Vilius Petkauskas / cybernews.com : Belarus state hackers suspected behind Ukraine cyberattack Grugq / grugq's domain : Uk...

2020-02-07
SecurityWeek 5 related

IoT security company Forescout Technologies says it has agreed to be acquired by private equity firm Advent International in a deal valued at $1.9B

Mike Lennon / SecurityWeek :

2019-06-07
SecurityWeek 5 related

Elastic, the company behind Elasticsearch and the Elastic Stack, to acquire endpoint security firm Endgame in a $234M deal

Mike Lennon / SecurityWeek :

2016-04-14
SecurityWeek 2 related

Lookout Expands Mobile Security Capabilities With Acquisition of Bluebox Security

Mike Lennon / SecurityWeek :

2015-09-10
SecurityWeek 3 related

Kaspersky: Turla cyber-espionage group hijacking satellite-based Internet links to hide wherabouts

Mike Lennon / SecurityWeek :

2015-06-23
SecurityWeek 2 related

The Linux Foundation's Core Infrastructure Initiative commits nearly $500K to three new projects, Reproducible Builds, The Fuzzing Project, and TIS Interpreter

Mike Lennon / SecurityWeek :

2015-03-16
Washington Post 20 related

Yahoo demos plug-in for end-to-end email encryption, to launch by end of year; rolls out single-use password via SMS feature

By Chris Stoner, Director of Product Management Soulskill / Slashdot : Yahoo Debuts End-To-End Encryption Email Plugin, Password-Free Logins Hannah Jane Parkinson / Guardian : Tired of forgetting your...

2014-12-26
Business Insider 50 related

The Interview now available to rent for $5.99 or purchase for $14.99 through YouTube, Google Play, Xbox Video, and SeeTheInterview.com

Starting at 10am Pacific Time this morning … Brad Smith / The Official Microsoft Blog : “The Interview” now available on Xbox Video Richard Procter / ReadWrite : “The Interview” Is Now Showing At A St...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...